Linux Worm Creating "Attack Network" 514
RomSteady writes "In what could be a case of the free pot calling the expensive kettle black, C|Net is reporting that a new Linux worm is "creating a rogue peer-to-peer network that has been used to attack other computers with a flood of data" and has already infected at least 3,500 servers. Seems it is true...the security of your web server depends on how effective you are at keeping up to date on patches, no matter if you are running Windows or Linux."
D'uh. (Score:4, Funny)
D'uh. Go on, mod me down if you must.
Re:D'uh. (Score:2, Offtopic)
Agreed. But insightful?
"Duh" +5 insightful?
Re:D'uh. (Score:4, Funny)
Re:D'uh. (Score:2)
It's common sense right? The more people use it, the more hacks and cracks will occur. I've been preaching for years, the more people see your software, the more they will mess with it. Linux is becoming very much main-stream and a viable option. The black hats are adjusting accordingly.
Re:D'uh. (Score:2)
But I *REALLY* cant picture the poster saying anything that kind had it been Windows affected by this virus. I mean really - it WOULDNT happen. Just keeping an open mind. Check the history - every Windows virus is announced with "Im glad Im using a secure OS link to debian.org" or something similar...
Re:D'uh. (with irony) (Score:2, Insightful)
Considering how many of the major distros have some sort of update tool, I'm really suprised this is as much of a problem as it is.
So, I'm glad I'm using a secure OS [debian.org].
Re:D'uh. (with irony) (Score:2)
Re:D'uh. (Score:3, Insightful)
I am glad that they used my submission without censorship, though.
One person farther down says that if something like this had been reported about Windows, it would have been Bill's fault, but when something happens on Linux, it's the sysadmin's fault. Personally, I think both are the sysadmin's fault. Nine times out of ten, patches are available for software shortly after the worm is first out there. If a sysadmin keeps up on his/her patches, the likelihood of infection/damage is very low.
Personally, I'd be very happy if /. would stop attacking Microsoft and start attacking the people who make the actual attacks. However, the likelihood of that happening is slim to nil, I'm afraid.
Did some one say..... (Score:2, Funny)
Re:D'uh. (Score:4, Insightful)
"How easily does a system lend itself to being upgraded out of the box, with no additional costs?"
"How quickly can a patch be developed and published"
"When I install the new patch am I going to have to accept some NEW BS license?"
I still choose Debian GNU/linux because I believe that apt-get being as easy as it is will keep newbie Linux people upgrading regularly. This alone could have significant impact.
Re:D'uh. (Score:4, Insightful)
While I actually agree with you -- I don't see how that is any easier than Windows popping up a requestor saying "YOUR CRITICAL UPDATES HAVE DOWNLOADED AND ARE READY TO INSTALL."
True, there is a good chance the new terms of usage might require you hand over your newborn, or give your soul to Billy, but the newbie doesn't care about this.
Linux users think they can topple the Windows empire because ethically, Free Software has a more solid foundation than Microsoft. But they seem to ignore the fact that this means nothing because most users have no ethics.
If Unix is going to shoehorn it's self moreso into the desktop market, it's going to have to appeal more to the laziness of the masses and spend less time touting the ethical reasons. Things like Apt-Get are major steps in the right direction, though.
visioneers (Score:2, Insightful)
Re:visioneers (Score:3, Funny)
Re:visioneers?! (Score:2)
Is this talking about the SSL hole? (Score:2, Interesting)
Re:Is this talking about the SSL hole? (Score:5, Informative)
Read the CERT Advisory CA-2002-27.
It's available here [cert.org]
Re:Is this talking about the SSL hole? (Score:2)
Re:Is this talking about the SSL hole? (Score:4, Funny)
Re:Is this talking about the SSL hole? (Score:5, Insightful)
The systems that are getting hit are the ones with lazy admins who don't promptly follow up on security patches.
Why do topics like this always have to degenerate into a holier-than-thou diatribe by a self-righteous few? I'm running a vulnerable system and it isn't because I'm "lazy" as you so kindly put it. I run Linux on my *desktop* and use it to play Quake, surf the web, and share out some HTML pages for my family. I run RH7.2 (only one version behind, bub) and run Ximian Red Carpet and up2date regularly. But no, I don't read bugtraq for the sheer joy and I usually wait for RPMs to come out before I install a patch. The unfortunate downside to RPMs is that if you compile your own software the RPM database starts to choke on its biscuits. So maybe, just maybe it's not that people who don't upgrade same day aren't lazy. Maybe we just don't have as much time or interest as you to troll bugtraq or more so, troll /. acting all high and mighty because of the stinking version of OpenSSL they run.
Re:Is this talking about the SSL hole? (Score:2)
Re:Is this talking about the SSL hole? (Score:2, Informative)
there are several maling lists [redhat.com] to choose from. the redhat watch list [redhat.com] will help you out with vulnerabilities.
really though do you think this is self-righteous? i would say it is being responsable. i hate all of those self-righteous people in cars who use seatbealts. they just think they are all that and a bag of chips. grow up and be responsable.
-you get an email about a vunerability
-drop to a console and type the following:
$su -
$service httpd stop
-then upgrade when you have the time.
really now, how hard is that?
Re:Is this talking about the SSL hole? (Score:2)
I agree with you about the attitude, but there's no reason a system used for what you're mentioning would be vulnerable. I'm horrible about updating my box, but since I have so few ports open and so few services running, no one can get to my box. Forwarding the range for the Neverwinter Nights server doesn't open up a whole lot of exploits. Well, except for all the buffer overflows I'm sure are there in their NWN server code....
Point taken but (Score:3, Insightful)
If you did any of these things, you are not directly vulnerable, and don't classify as lazy. But if you were running a production server and did not want to do a security patch because "there are no rpm's yet" then you would be lazy and I would berate you for it
So my point is-- you can't compare apples and oranges here, and security is important to everyone, but there are different ways of
handling this security as appropriate for environment. If you think security doesn't matter, you are not lazy so much as clueless, but if you think that there is only one path to security, you are missing the point too.
I did support for Windows for a while and I was amazed at how many compromized systems I found because home users thought "I don't need security." It is all fun and games until people start uploading illegal content (such as kiddie porn) onto your system of your account gets terminated with your ISP because someone used your system to attack another computer, etc.
I don't care who you are-- security is important.
Interesting, but dangerous approach that is (Score:4, Insightful)
You are running a computer that is connected to the Internet. For the sake of this argument it doesn't matter which system you favour. You are the admin of this machine.
Like it or not, you have responsibility towards ALL other network peers (i.e. the whole Internet) to make your system as secure as possible. Consider malicious software that can start DoS attacks on other remote boxes. Your insecure machine is now causing trouble to others as well as yourself (degrading connectivity).
Would you like this? Your answer could be: I don't care.
Imagine someone else has a similarly unpatched/insecure system and is directing DoS attacks on your IP. Do you care now? I guess you would.
The problem is that advertising and far too many teachers in "Internet for dummies" courses do not emphasize the fact that anyone with admin privileges on any computer (that is connected to the Internet) is effectively an administrator and has to act accordingly on issues like security. Point'n'Click installation doesn't make it any easier: You want to run a web server? Here you go.
How many install software without knowing about the security implications of the stuff they are going to run? I guess far too many. If you had to read about a certain program BEFORE you install it, the manual or How-To can give you an idea of the security implications you are probably going to run into, thus alerting the admin (on a home system that means you) and increasing awareness.
This could be a reason why Linux/Unix installations often seem to be more secure: You have to read a lot more before you can actually do something. This advantage, of course is slowly going away with point and click installations on Linux systems as distro installation programs become more user-friendly and everything gets installed via a graphical system. This might be ok for an advanced user, but could be dangerous in the hands of a novice (i.e. most home users).
I guess you could compare it to driving a car, where you have to get a license in order to participate in public traffic, because you need to know about the rules and dangers beforehand. The impact your mistakes might have on others can be very serious.
I don't want to lecture you, but I think it is important to increase awareness of security ramifications on boxes that are connected to others.
Re:Interesting, but dangerous approach that is (Score:3, Insightful)
Like it or not, you have responsibility towards ALL other network peers (i.e. the whole Internet) to make your system as secure as possible.
Sorry but I'm gagging uncontrollably at the thought of your saccharine love-fest. I am not here to protect *other* people's PCs from compromise, should I hold hands with other sysadmins and pray for the health of their machines while I'm at it? No. My machine isn't as secure as some but I try my best and check Red Carpet daily.
Your argument is that as a user with a public IP address it's my responsibility to have every package on my system updated on a daily basis. Hence by your logic, if I'm not doing so then I don't have a right to be on the net. It's precisely this kind of jaded self-righteousness that people hate about a small handful of Linux geeks. When even Linux geeks are telling you to get a life, maybe you should consider it!
Bad analogy (Score:3, Insightful)
Bad analogy. Better one: If someone steals your car because you don't have a car alarm and then crashes and kills someone, are you to blame?
No! You are the victim of grand theft auto.
If your computer is insecure and it gets broken into and is used for a malicious act, you are the victim of being hacked. It's not your responsibility to protect your computer from hackers anymore than it is your responsibility to secure your car from theft.
If you are the computer security adviser to a large company then you are in trouble. Otherwise, it's the police's fault for not stopping it.
Note: I have secured my box (to the best of my ability) but I am reasonably computer literate. I don't think my Grandmother should have to do it.
Re:Is this talking about the SSL hole? (Score:5, Informative)
1) Download openssl-0.9.6g.tar.gz from a mirror.
2) rpm -tb openssl-0.9.6g.tar.gz
3) rpm -Uvh
Even easier.
That happened to me, too, but with wu-ftpd (Score:2, Informative)
However, pureftpd [pureftpd.org] works great!
Seems to me that the really nasty vulns lie in wait while you get yourself into the worst situation possible for handling it.
Expect more of this... (Score:2, Insightful)
Re:Expect more of this... (Score:2, Funny)
Acutally what I am afraid of is this--- (Score:3, Insightful)
1: It did not delete its source code file on execution.
2: It did not hide its binary very well.
If the worm did these things it would have been MUCH harder to detect and deal with. As it is my servers are secure (no SSL for now, and I have the latest version of OpenSSL for when I want to re-impliment it), but I would have been worried to some extent if I could not have actially looked for bugtraq.c in the
Many trojans I am aware of do these things, though.
Re:Expect more of this... (Score:2, Insightful)
I replaced a moron with an mcse (I have no certs) because he could not do anything (and I do mean anything) right, he got the job because he had an MCSE, he lost the job because he was a nitwit but sure enough withing a week he had another sysadmin job.
The problem is that managers think an MCSE means something! the interview standards are much harder on a *nix person because you really have to know what youre doing to make a *nix network useable by everyone and in the process you know how to make it secure. You can set up a useable MS netowrk out of the box but (even if you know little) but its not secure.
Well Duh! (Score:5, Insightful)
This new attack is easily avoided by upgrading your OpenSSL version to 0.9.6e, and this should have been done by now. The hole has been known and example exploit available for a while now, as anyone who follows the bugtraq list would know.
Security is an ongoing process. You have to stay on top of it if you run machines that are not turned off and locked in a basement. There is just no way around the fact that there will always be bugs in software, and these days that commonly means security holes as well.
Re:Well Duh! (Score:2)
Or at least the version of it recently discussed on bugtraq had this behavior.
Re:Well Duh! (Score:2, Interesting)
#touch
#chmod 000
That should make it impossible for it to create the executable -- and the presence of the
(Note: This is a preventitive measure of this specific worm. All someone would have to do is change the filenames that it uses to get around this, so fix it properly asap)
Get ready for more (Score:4, Interesting)
That said, this has to be the coolest worm ever! No way! I mean, it actually has like a hive mind. I wonder if it has a queen?
Re:Get ready for more (Score:5, Funny)
No, probably not a queen. But it might a pimple faced prince, lurking somewhere in his parents' basement.
Re:Get ready for more (Score:2)
That pimple faced prince might still be a queen. You know -- the kind that dresses in womens clothing and keeps people in deep pits in their basement while exclaiming things like "It puts the lotion on its skin!"
I don't like... (Score:5, Insightful)
Newspeak...
I'm sorry, but sometimes 'Crimethink' isn't the whole story.
Re:I don't like... (Score:2, Insightful)
Because this worm creates a virtual network for itself, and individual machines can send messages to others on the virtual network, with commands or messages.
Re:I don't like... (Score:4, Insightful)
How about because neither Nimda nor Code Red were peer to peer networks, they just attacked nearby subnets indiscriminately. This creates a peer to peer network that an attacker can harness to DOS machines.
Re:I don't like... (Score:2)
Re:I don't like... (Score:5, Informative)
Re:I don't like... (Score:3, Insightful)
Words.
Deeds.
Ah well. People are like stars. There are som that are bright and then there are those that are dim.
Re:I don't like... (Score:3, Insightful)
The person who wrote that comment and the person who added the exploit code are not necessarily the same.
you forgot a line and veered off track (Score:3, Insightful)
Well, not really, but it all has a Microsoft stink to it. Buzwords like "peer to peer" used to describe computers that simply broadcast a huge list if indeed the list is not cenralized. The term admins. Using UDP [pcwebopaedia.com] for TCP [pcwebopaedia.com], the dude is a moron.
The proported author is a liar and the comments should be ignored. They tell "admins" who removed the autor to watch their backs, then claim the program is for educational purposes and should never be "ran at all". Yeah right.
Thank you CNET for naming peer to peer, Apatche and Linux. Looks like all the criticism about not naming Microsoft operating systems and specific Microsoft applications as the weakenesses exploited has sunk in. For this article two of the three things CNet wishes to bash are in the headline! Nice work CNet, keep being direct like that and you might gain some credibility - not really!
The Diierence.... (Score:5, Insightful)
I'd agree with that statement - the difference being that with the Windows patch you may need to restart your server (bad), and you may have to swallow a new EULA (could be VERY bad).
One other small difference (Score:4, Interesting)
By the way, who says this attack won't affect Apache on Windows, Sun, True Unix, etc?
"You looked at your network settings, you should reboot your computer now."
Attack filter list (Score:4, Interesting)
Re:Attack filter list (Score:2)
complexity breeds insecurity (Score:2)
Today's software is too complex to be comprehended by the human mind in all its permutation of states. Add in network effects when this software runs alongside other software, and on multiple machines, and the following conversation will always be accurate:
Question: Does software package XYZ contain show-stopping security holes?
Answer: Yes.
Throw in clueless admins, and you've got a big barrel of fun. Open source can't help you here.
This doesn't mean that open-source software isn't better for other reasons, but I've always shied away from saying open-source is more secure because I don't believe any piece of software is truly secure these days. So what if IIS has ten root holes and Apache has one (hypothetically)? You're still insecure.
Anyway, why are they calling it a P2P attack network? Aren't ALL worms peer-to-peer??? I don't remember Code Red checking in to an "attack server" before connecting to other IP addresses.
Stoner's lament (Score:4, Funny)
: (
Umm... (Score:2)
NOTE: These instructions are for all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.
1. Update the virus definitions.
2. Run a full system scan, and delete all files that are detected as Linux.Slapper.Worm.
I wasn't aware there was a norton anti-virus program for linux. I could be wrong but I checked around their site and google and found nothing. Thats really not great removal tips. However I very much agree with their little 8 step or whatever program. About making people aware of attachments, running extra services, etc.
Re:Umm... (Score:2, Informative)
Simple explanation... (Score:2)
Now world+dog knows about the terror-istic "P2P" and "Linux." Horror of horrors! This is the exact kind of terror that Palladium would fix! Just think, right now in the world are millions of boxen, and their users are in full control to do as they please! Shock! Horror!
But you think the press would report on this openly and honestly, and would not be bought by the **IA? Really? So Time and Newsweek (AOL-TimeWarner), MSNBC (Micro$oft)... yeah, real OPEN reporting. More news on how the world works, whoever buys the most expensive advertising in your magazine gets the best bits of news and controls it. Look at PC Ragazine... whoever gets the glossy inside cover advert (usually Dell boxen or NEC montitors) always get "Editors Choice").
Re:Simple explanation... (Score:2)
Re:Simple explanation... (Score:2)
How can ya tell? What do you do? (Score:2)
If yes, how do you clean it up?
Re:How can ya tell? What do you do? (Score:2, Insightful)
Re:How can ya tell? What do you do? (Score:2)
What if I have to check other people's boxen? What if I was out of town for 3 mo and had no computer access?
God damn, nice attitude
Re:How can ya tell? What do you do? (Score:2)
and I run up2date regularly but as I see I am still on 0.9.6b-28, even though up2date says I have nothing to update
It's not just patches (Score:2)
I know a lot of you people like to bash windows as being insecure or unstable. But I can't tell you how many times people have come to me and showed me problems with windows boxen that were simply misconfigurations. My win2k box (that I'm using right now) might be old and slow, but it's a rock. Configuration is key. Especially all the hidden options in deep down dialog boxes.
Nothing, not even the best linux, is secure out of the box.
The real question. (Score:2)
I would suspect that the worm would possibly effect the ports too. Does anyone have any info on that?
Re:The real question. (Score:2)
Re:The real question. (Score:2)
Hello. I'm a cross-platform advocate. Now that we've got _that_
settled...
> but this is the real question... Does it effect Apache for
> Windows and other platforms? Perhaps the media is immefiately
> associating Apache with Linux- something that it is not really
> even part of.
The slapper worm appears to specifically look for Linux systems
running Apache, or so the article seems to indicate, but the
vulnerability (which was covered on
OpenSSL, if I understand correctly. So it does affect other
systems than just Linux, but not most Windows systems. (With
Cygwin, it is possible to run an OpenSSL server on Windows, but
that's another can of worms.)
> I would suspect that the worm would possibly effect the ports
> too. Does anyone have any info on that?
Whether Slapper does or (more likely) doesn't, the vulnerability
that makes the worm _possible_ is an issue for any system that
uses OpenSSL. Therefore, if you use OpenSSL on a system that
has secure ports open to the internet, you should either patch
it or upgrade it. Known vulnerabilities should be fixed, whether
or not there's an exploit in the wild. That's basic security
practice, right up there with turning off unused services.
Didn't Apple release a security update for 10.1.5 that fixes
the OpenSSL issue? Or was that the OpenSSH issue? Or was it
the same issue? I'm confused now...
udp network (Score:2)
so you do, of course, have a firewall that blocks everything but the few ports you need.
you don't? what the fuck are you doing on the 'net?
careless driving is illegal. careless server administration should probably be, too.
Re:udp network (Score:2)
If the worm talks on UDP port 2002 only after doing some sort of initial setup through a commonly open port (like port 80), wouldn't that be possible with most people's firewall config?
Distributions, sub-version #'s, & straight ans (Score:2)
Apache 1.3.12, 1.3.17, 1.3.19, 1.3.20, 1.3.23
I just checked my version of Apache for SuSE 7.3, and it's 1.3.20-60.
I know that distributions tend to release their own versions of things with important patches included, but other than digging into the release notes for apache for a while till I can find the answer I need, is there any way to know whether the "-60" addresses this problem?
Or, as another option, might there be anything that accurately TESTS for this weakness and provides a result?
Keeping up with patches is good! Being able to accurately TEST the security of the compromised code after those patches are applied is better.
Re:Distributions, sub-version #'s, & straight (Score:2, Informative)
And yes, keeping up with patches is good. You should try to practice it. Also, subscribe to BugTraq.
Re:Distributions, sub-version #'s, & straight (Score:5, Insightful)
openssl-0.9.6b-28 is the current red hat version, and it is fully fixed.
It even shows the old version if you run openssl version:
OpenSSL 0.9.6b [engine] 9 Jul 2001
It is, however completely patched, and came out in early August.
Modern distros value stability in current releases, and will not upgrade to the latest version just to get a bugfix. This is the value they add, you don't have to worry about a security patch breaking some critical functionality.
Further Info (Score:5, Informative)
Once the program is running, it accepts commands on UDP port 2002.
Simple solution, so your bandwidth won't be exploited for a DDOS, block UDP port 2002.
The worm can be used for multiple purposes, including execution of arbitrary commands on your machine, various flood attacks, etc.
You need to patch your machine, before a more dangerous worm comes along. If you can't patch right away, at least block UDP port 2002.
Additionally, your
is this a root exploit? (Score:2)
Additionally, your/tmp (if located on a separate partition) should be mounted noexec
that's not a good idea
This is already standard practice (Score:3, Insightful)
Worms, viruses and intelligence. (Score:2, Interesting)
Then came the time of harmful viruses, the ones that formatted your HD on certain event.
Now then, it came the time of internet, and worms came. Worms spread through different holes in machines, mostly e-mail readers. (everyone had them.. most of them had holes.. tsk tsk..)
The worms itself evolved in many ways, others became DDOS tools, others just spread. Most of them were a pain anyways, as they affected more than the people with buggy software.
Oh well, it's a challenge to write a worm/virus that can spread without anyone noticing it before it's too late. Believe me, we have thought it over and over.. tried to think of a method to spread, one without any way of backtracking the worm, allowing the worm to spread with different methods, through different holes and allowing the creator of the worm to update copies of the worm while it's spreading. Interesting thought to play around with.
Is Linux now a POS? (Score:5, Insightful)
Let's face some facts, there are probably more "forgotten" Linux servers than Windows ones, simply because Linux can run unattended for months at a time and Windows cannot. Making the reasonable assumption that a sizable number of these neglected machines will not be fixed, suddenly Linux and OSS looks no better than the Windows machines that are still infected with Nimda or something similar because no one has been bothered to apply patches.
I await your wrath for being reasonable.
Re:Is Linux now a POS? (Score:5, Insightful)
No, Linus didn't make Apache or the OpenSSL library (the real problem).
If anyone deserves the blame for this, its the OpenSSL team [openssl.org] themselves (and I would hedge a bet more of them work for BSD rather than Linux, just by the license). They caused the vulnerability. One would think that a team of programmers who are trying to create a set of high-security tools wouldn't _ever_ have a buffer overflow. That's the kind of mistake a green programmer like myself would make.
The fact is people blame Microsoft for Nimda because Microsoft made the vulnerable IIS webserver. Blame went where blame was due.
So, anyways, blame the right people. Microsoft for IIS, OpenSSL team for OpenSSL.
Re:Is Linux now a POS? (Score:3, Insightful)
It seems to me that it has been thoroughly proven that programmers are incapable of handling memory management on their own. The number of problaems that buffer overflows, memory leaks, and other such problems have caused is staggering. I don't care how great you think you are, you shouldn't be doing your own memory management. Given enough time you'll fuck something up.
Re: (Score:2)
Dammit! (Score:2)
X86 (Score:2)
Right now, almost all (non-script language) viruses are for X86. Most root exploits are for X86, with a few more for SPARC.
I had two boxes get rooted last year thanks to bugs in SSH, but I doubt it will happen again after I replace them with Macs running OS X. But I am glad I never got around to installing OpenSSL with Apache.
Self Destruct (Score:5, Interesting)
Another evil plan with a big red Self Destruct button: one of the supported remote instructions for the network is "run a command" (0x24). All you have to do is find an entry point and command it to killall -9 .bugtraq and the command will propagate through the network, killing itself. Doesn't keep it from regenerating on the original https vulnerability vector, but we could perhaps slow down the DDoS attacks.
Re:Self Destruct (Score:3, Informative)
echo 'See http://whatever' |mail -s 'YOUR SYSTEM IS HACKED' root; echo killall -9
Here's how to stop _this_ one. (Score:2, Informative)
Anyway:
su -
cd
ls -a
If there is anything in your
If you haven't been compromised yet:
touch
chmod 000
chown root.root
then...
which gcc
and, chmod 700 that file.
This means that normal users will not be able to compile c code. If this is unacceptable, you can undo it after you get OpenSSL up to date.
Re:Here's how to stop _this_ one. (Score:3, Interesting)
I didn't see this described as a root exploit. Did I miss something?
Irony (Score:2)
How Come? (Score:3, Interesting)
Re:No, one worm can't rival Microsoft's history. (Score:2)
Re:No, one worm can't rival Microsoft's history. (Score:2)
Re:Not everyone is a Linux expert (Score:5, Informative)
Do "telnet your.www.host 80" then type "HEAD / HTTP/1.0" and hit enter. Take a look at the "Server:" line, it'll tell you if OpenSSL is installed and enabled. If it is, and the version is less than 0.9.6e, you should upgrade.
Re:Why is this topic here again? (Score:4, Interesting)
Much like those of us who understand that there are no insecure systems, only insecure sysadmins had our Win2K boxes patched against Code Red a full MONTH before it hit the wild?
If anything, Linux makes a lot of people too damn complacent. "Oh, I'm running Linux, don't need to worry about all those Windoze viruses and script kiddies!"
Re:Why is this topic here again? (Score:3, Insightful)
Are you suggesting that Code Red should not have been reported on Slashdot, as the patch was out a month before the infections took place? Or is it only Linux exploits that should be blacked out once a patch is available?
I don't think anyone is blaming the programmers - the story seemed pretty clear that it is admins that fail to patch that are at fault here.
Re:Where are the RHN Updates ? (Score:2)
RedHat fixed this and released the OpenSSL RPMs back at the end of July. However, you won't see a version-number change in OpenSSL because of the fix. RH took the fix, ported it to the 0.9.6b codebase they use for their package and released it as an 0.9.6b update RPM. This tends to confuse people, because RH's current 0.9.6b isn't vulnerable even though stock 0.9.6b is.
Re:Where are the RHN Updates ? (Score:2, Interesting)
> current 0.9.6b isn't vulnerable even though
> stock 0.9.6b is.
Yeah. Confusing it is. I don't see anything in the RedHat RPM indicating that it is different from stock 0.9.6b.
The only indicator is that the package release number is currently 28... 28 releases for the same package, no track of what the releases are about.
Call me a whiner, but I say it's sloppy.
Re:Where are the RHN Updates ? (Score:3, Informative)
> the RedHat RPM indicating that it is different
> from stock 0.9.6b.
You could try looking at the changelog
rpm -q --changelog openssl
(or rpm -qi --changelog openssl if you prefer.)
Re:actual apache log lines (Score:5, Informative)
Re: My biggest Linux web server headache is MS! (Score:2)
I need the FrontPage server extensions on it, and MS did a notoriously poor job of development on those for Unix. A perfectly secure Apache server can be rendered "full of security holes" by using their add-in.
In fact, I've found at least two different independent projects to rewrite the mod_frontpage module to make it more secure. One such project's results seem to have problems of their own. (I saw bugtrak reports of it having a buffer overflow exploit in it - and it looks like its author never bothered to work on the project again since that time.) The other (newer) project on Sourceforge looks more promising - but I was unable to get it working properly on my particular RedHat 7.3 server.
I'm not a "zealot" proclaiming Linux is inherently "better" than anything Microsoft has done or will do. IMHO, Linux certainly doesn't have the workstation desktop solution of choice yet. On the other hand, Microsoft's track record speaks volumes about their ability to provide secure sever products. They can't! When you hear about the latest worm or virus attacking Windows, you say "Oh boy, here we go again!" When it happens for Linux, it's big news. There's a reason for that....
Re:zealots in a panic now? (Score:2)
i said a better solution. that means more people patching somehow.
i dont pretend to know that solution, but surely the linux people will come up with a better way than ms does, so that they stop failing as precisely the same place ms does.
Re:zealots in a panic now? (Score:2, Interesting)
I don't know if there is a magic bullet. I mean there is no substitute for competent users that keep their system up with security patches. "This ain't your daddy's Internet no more." I think a lot of it stems from false authority syndrome, people think they know what they are doing when in reality they have no clue. This just comes from making it easier and easier to use software. When there was a barrier to entry that involved actually having computer skills, things weren't so bad overall.
Recent versions of red hat have a little update utility similar to windows update that sits in the Gnome panel, which tells you if you need to update, and they also have the Red Hat Network, which can be put on "automatic", which is supposed to push out patches (I don't trust it myself), but running up2date -u every week or two is a safe bet for staying up on patches.
So, yeah, your point is somewhat valid, but only against the most ignorant Linux zealots. MS still has major security problems,
I pointed them out in a recent post to the other article about this worm, but to sum up, very slow turnaround on patches, lack of attention to security bugs they consider "minor" that can quickly escalate to "major" by combination of multiple bugs, a general lack of seperation between user and administrator rights in the OS and in apps developed for windows, the aggressive EOL cycles, patches that are vague in nature so much that the administrators don't know exactly what they are patching, patches that undo other patches, and the combination of IIS into one big "superservice".
Re:You knew it was coming... (Score:2)
Re:Hmm... (Score:2)
I think you must remember wrongly.
The Cert advisory [cert.org] for the exploit that let Code Red in was published in June. It references the update [microsoft.com] that will fix the vulnerability, also published in June.
The Code Red advsisory [cert.org] didn't come out until a month later, in July.
Unless CERT were unusually slow in publishing their advisory on Code Red, your version of events seems strange. I can also remember IIS admins that had installed the patch having little sympathy for admins hit by Code Red.
Criticise MS where they get things wrong by all means, but please make sure the facts are right or posts like yours are just as much FUD as Bill saying that the GPL is viral.